112 resultados para Human identification protocols
em Queensland University of Technology - ePrints Archive
Resumo:
Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.
Resumo:
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. In this paper we show two efficient probabilistic attacks on this protocol which reveal the user’s secret after the observation of only a handful of authentication sessions. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values which cross the threshold of usability.
Resumo:
We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.
Resumo:
This research has successfully applied super-resolution and multiple modality fusion techniques to address the major challenges of human identification at a distance using face and iris. The outcome of the research is useful for security applications.
Resumo:
A new approach for recognizing the iris of the human eye is presented. Zero-crossings of the wavelet transform at various resolution levels are calculated over concentric circles on the iris, and the resulting one-dimensional (1-D) signals are compared with model features using different dissimilarity functions.
Resumo:
The solutions proposed in this thesis contribute to improve gait recognition performance in practical scenarios that further enable the adoption of gait recognition into real world security and forensic applications that require identifying humans at a distance. Pioneering work has been conducted on frontal gait recognition using depth images to allow gait to be integrated with biometric walkthrough portals. The effects of gait challenging conditions including clothing, carrying goods, and viewpoint have been explored. Enhanced approaches are proposed on segmentation, feature extraction, feature optimisation and classification elements, and state-of-the-art recognition performance has been achieved. A frontal depth gait database has been developed and made available to the research community for further investigation. Solutions are explored in 2D and 3D domains using multiple images sources, and both domain-specific and independent modality gait features are proposed.
Resumo:
The sum of k mins protocol was proposed by Hopper and Blum as a protocol for secure human identification. The goal of the protocol is to let an unaided human securely authenticate to a remote server. The main ingredient of the protocol is the sum of k mins problem. The difficulty of solving this problem determines the security of the protocol. In this paper, we show that the sum of k mins problem is NP-Complete and W[1]-Hard. This latter notion relates to fixed parameter intractability. We also discuss the use of the sum of k mins protocol in resource-constrained devices.
Resumo:
Objectives This study introduces and assesses the precision of a standardized protocol for anthropometric measurement of the juvenile cranium using three-dimensional surface rendered models, for implementation in forensic investigation or paleodemographic research. Materials and methods A subset of multi-slice computed tomography (MSCT) DICOM datasets (n=10) of modern Australian subadults (birth—10 years) was accessed from the “Skeletal Biology and Forensic Anthropology Virtual Osteological Database” (n>1200), obtained from retrospective clinical scans taken at Brisbane children hospitals (2009–2013). The capabilities of Geomagic Design X™ form the basis of this study; introducing standardized protocols using triangle surface mesh models to (i) ascertain linear dimensions using reference plane networks and (ii) calculate the area of complex regions of interest on the cranium. Results The protocols described in this paper demonstrate high levels of repeatability between five observers of varying anatomical expertise and software experience. Intra- and inter-observer error was indiscernible with total technical error of measurement (TEM) values ≤0.56 mm, constituting <0.33% relative error (rTEM) for linear measurements; and a TEM value of ≤12.89 mm2, equating to <1.18% (rTEM) of the total area of the anterior fontanelle and contiguous sutures. Conclusions Exploiting the advances of MSCT in routine clinical assessment, this paper assesses the application of this virtual approach to acquire highly reproducible morphometric data in a non-invasive manner for human identification and population studies in growth and development. The protocols and precision testing presented are imperative for the advancement of “virtual anthropology” into routine Australian medico-legal death investigation.
Resumo:
Surveillance networks are typically monitored by a few people, viewing several monitors displaying the camera feeds. It is then very difficult for a human operator to effectively detect events as they happen. Recently, computer vision research has begun to address ways to automatically process some of this data, to assist human operators. Object tracking, event recognition, crowd analysis and human identification at a distance are being pursued as a means to aid human operators and improve the security of areas such as transport hubs. The task of object tracking is key to the effective use of more advanced technologies. To recognize an event people and objects must be tracked. Tracking also enhances the performance of tasks such as crowd analysis or human identification. Before an object can be tracked, it must be detected. Motion segmentation techniques, widely employed in tracking systems, produce a binary image in which objects can be located. However, these techniques are prone to errors caused by shadows and lighting changes. Detection routines often fail, either due to erroneous motion caused by noise and lighting effects, or due to the detection routines being unable to split occluded regions into their component objects. Particle filters can be used as a self contained tracking system, and make it unnecessary for the task of detection to be carried out separately except for an initial (often manual) detection to initialise the filter. Particle filters use one or more extracted features to evaluate the likelihood of an object existing at a given point each frame. Such systems however do not easily allow for multiple objects to be tracked robustly, and do not explicitly maintain the identity of tracked objects. This dissertation investigates improvements to the performance of object tracking algorithms through improved motion segmentation and the use of a particle filter. A novel hybrid motion segmentation / optical flow algorithm, capable of simultaneously extracting multiple layers of foreground and optical flow in surveillance video frames is proposed. The algorithm is shown to perform well in the presence of adverse lighting conditions, and the optical flow is capable of extracting a moving object. The proposed algorithm is integrated within a tracking system and evaluated using the ETISEO (Evaluation du Traitement et de lInterpretation de Sequences vidEO - Evaluation for video understanding) database, and significant improvement in detection and tracking performance is demonstrated when compared to a baseline system. A Scalable Condensation Filter (SCF), a particle filter designed to work within an existing tracking system, is also developed. The creation and deletion of modes and maintenance of identity is handled by the underlying tracking system; and the tracking system is able to benefit from the improved performance in uncertain conditions arising from occlusion and noise provided by a particle filter. The system is evaluated using the ETISEO database. The dissertation then investigates fusion schemes for multi-spectral tracking systems. Four fusion schemes for combining a thermal and visual colour modality are evaluated using the OTCBVS (Object Tracking and Classification in and Beyond the Visible Spectrum) database. It is shown that a middle fusion scheme yields the best results and demonstrates a significant improvement in performance when compared to a system using either mode individually. Findings from the thesis contribute to improve the performance of semi-automated video processing and therefore improve security in areas under surveillance.
Resumo:
The SER spectra of riboflavin and FAD are identical and are resonance enhanced at 514 or 532 nm. Signals from FAD/ riboflavin dominated SER spectra whenever these compounds were present with proteins or bacteria. SER spectra of very different bacteria such as Pseudomonas. aeruginosa, Bacillu. subtilis and Geobacillus. stearothermophilus were dominated by signals from FAD, even when these bacteria were added to a preformed colloid. The SERS signal of FAD is greatly reduced at 785 nm, and SER spectra of bacteria excited at 785 nm are quite different than those collected at 514 or 532 nm. This supports the assignment of the peaks in the 514 nm SER spectra of bacteria to FAD rather to amino acids or N-acetylglucosamine. The SER spectra of certain mixes of adenine and FAD showed similar changes to those of bacteria when the excitation was changed from 514/532 nm to 785 nm. The ratio of colloid: bacteria was of critical important for obtaining good SER spectra, and the addition of sodium sulfate was also beneficial. Removal of EPS from bacteria before analysis facilitated interaction with the silver surface, and may be a useful step to include in identification protocols.
Resumo:
Gifted students who have a reading disability have learning characteristics that set them apart from their peers. The ability to read impacts upon all areas of the formal curriculum in which print-based texts are common. Therefore, the full intellectual development of gifted students with a reading disability can be repressed because their access to learning opportunities is reduced. When the different learning needs caused by concomitant giftedness and reading disability are not met, it can have serious implications for both academic achievement and the social-emotional wellbeing of these students. In order to develop a deeper understanding of this vulnerable group of students, this study investigated the learning characteristics of gifted students with a reading disability. Furthermore, it investigated how the learning characteristics of these students impact upon their lived experiences. Since achievement and motivation have been shown to be closely linked to self-efficacy, self-efficacy theory underpinned the conceptual framework of the study. The study used a descriptive case study approach to document the lived experiences of gifted students with a reading disability. Nine participants aged between 11 and 18, who were formally identified as gifted with a reading disability, took part in the study. Data sources in the case study database included: cognitive assessments, such as WISC assessments, Stanford Binet 5, or the Raven's Standard Progressive Matrices; the WIAT II reading assessment; the Reader Self-Perception Scale; document reviews; parent and teacher checklists designed to gain information about the students' learning characteristics; and semi-structured interviews with students. The study showed that gifted students with a reading disability display a complex profile of learning strengths and weaknesses. As a result, they face a daily struggle of trying to reconcile the confusion of being able to complete some tasks to a high level, while struggling to read. The study sheds light on the myriad of issues faced by the students at school. It revealed that when the particular learning characteristics and needs of gifted students with a reading disability are recognised and met, these students can experience academic success, and avoid the serious social-emotional complications cited in previous studies. Indeed, rather than suffering from depression, disengagement from learning, and demotivation, these students were described as resilient, independent, determined, goal oriented and motivated to learn and persevere. Notably, the students in the study had developed effective coping strategies for dealing with the daily challenges they faced. These strategies are outlined in the thesis together with the advice students offered for helping other gifted students with a reading disability to succeed. Their advice is significant for all teachers who wish to nurture the potential of those students who face the challenge of being gifted with a reading disability, and for the parents of these students. This research advances knowledge pertaining to the theory of self-efficacy, and self-efficacy in reading specifically, by showing that although gifted students with a reading disability have low self-efficacy, the level is not the same for all aspects of reading. Furthermore, despite low self-efficacy in reading these students remained motivated. The study also enhances existing knowledge in the areas of gifted education and special education because it documents the lived experience of gifted students with a specific learning disability in reading from the students' perspectives. Based on a synthesis of the literature and research findings, an Inclusive Pathway Model is proposed that describes a framework to support gifted students with a reading disability so that they might achieve, and remain socially and emotionally well-adjusted. The study highlights the importance of clear identification protocols (such as the use of a range of assessment sources, discussions with students and parents, and an awareness of the characteristics of gifted students with a reading disability) and support mechanisms for assisting students (for example, differentiated reading instruction and the use of assistive technology).